Obs/bin/ObsDep/content/Powershell/Roles/Common/Servicing/Scripts/Install-Update.psm1

<###################################################
 # #
 # Copyright (c) Microsoft. All rights reserved. #
 # #
 ##################################################>


# TODO: Use Common functions for session re-use
# TODO: Clean up trace execution to full sentences.
# FUTURE: Implement MSPs - postponed
# FUTURE: Allow computer arrays rather than just one at a time
# FUTURE: Use other mechanisms in Test-UpdateRebootRequested similar to MSFT_xPendingReboot from DSC

$Script:UpdateRebootRequestedPath = Join-Path $env:SystemDrive UpdateRebootRequest.xml

<#
.Synopsis
   Updates a running computer.
.Description
    Runs PowerShell scripts and KB .MSUs from the source path, without rebooting it.
 
    Requires CredSSP enabled from this computer to each of the targets.
    Does not reboot targets, caller can use Test-UpdateRebootRequired to
    determine status and reboot it if necessary. It is assumed that
    additional orchestration with existing roles is necessary, so it is
    not safe to do this "all in one" similar to Cluster Aware Updating.
 
    For scripts:
       Scripts will be invoked directly from the source location, allowing
       the script to know and reference additional materials relative to
       the script location.
 
       Default execution policy of the computer will be respected
       unless BypassExecutionPolicy is set. This allows the source directory
       to be remote to the computer, yet not require signing for test scenarios.
.Link
    Test-UpdateRebootRequested
#>

function Install-Update
{
    [CmdletBinding()]
    Param
    (
        # Computer name to update
        [Parameter(Mandatory=$true)]
        [string]
        $ComputerName,

        # Explicit Credential for CredSSP
        [Parameter(Mandatory=$true)]
        [PSCredential] [System.Management.Automation.Credential()]
        $Credential,

        # Source for updates
        [Parameter(Mandatory=$true)]
        [string]
        $SourcePath,

        # Optional Scratch directory for update installation
        [string]
        $ScratchDirectory = $null,

        # Bypass default execution policy
        [switch]
        $BypassExecutionPolicy
    )
    $ErrorActionPreference = "Stop"

    Install-UpdateScript -ComputerName $ComputerName -Credential $Credential -SourcePath (Join-Path $SourcePath "Script") -BypassExecutionPolicy:$BypassExecutionPolicy
    Install-UpdateKB -ComputerName $ComputerName -Credential $Credential -SourcePath $SourcePath -ScratchDirectory $ScratchDirectory
}

<#
.Synopsis
    Indicates whether a computer needs a reboot to complete updating
.Description
    Timestamp in file indicates when reboot was last requested,
    Test-UpdateRebootRequested will compare this timestamp to the actual
    time of last reboot.
 
    This function does not check other side effect locations of other
    software install or update processes. Update scripts, in particular,
    may need a reboot without marking the other locations so this
    mechanism provides a definitive marking.
    Future implementations may check the other locations, such as
    those checked by the DSC resource MSFT_xPendingReboot.
.Link
Install-Update
.Link
Set-UpdateRebootRequested
#>

function Test-UpdateRebootRequested
{
    [CmdletBinding()]
    Param
    (
        [Parameter(Mandatory=$true)]
        [string]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        [PSCredential] [System.Management.Automation.Credential()]
        $Credential
    )
    $ErrorActionPreference = "Stop"

    $result = Invoke-Command -ComputerName $ComputerName -Credential $Credential -ScriptBlock {
        if (!(Test-Path $using:UpdateRebootRequestedPath))
        {
            return $false
        }

        $request = [DateTime]::MaxValue
        try
        {
            # incoming time is in UTC ticks
            [DateTime] $request = Import-Clixml -Path $using:UpdateRebootRequestedPath
        }
        catch
        {
            Write-Warning "Invalid incoming UpdateRebootRequestedPath time, assuming reboot required"
        }

        $os = Get-CimInstance -Class Win32_OperatingSystem
        [DateTime] $lastBoot = $os.LastBootUpTime.ToUniversalTime()

        if ($lastBoot -lt $request)
        {
            return $true
        }
        else
        {
            Remove-Item -Path $using:UpdateRebootRequestedPath
            return $false
        }
    }

    return $result
}

<#
.Synopsis
    Marks a computer to indicate a reboot is needed to complete updating
.Description
    Timestamp in file indicates when reboot was last requested,
    Test-UpdateRebootRequested will compare this timestamp to the actual
    time of last reboot.
 
    Scripts can mark local machine request with the following snippet:
    $UpdateRebootRequestedPath = Join-Path $env:SystemDrive UpdateRebootRequest.xml
    [DateTime]::UtcNow.Ticks | Export-Clixml -Path $Script:UpdateRebootRequestedPath
.Link
Test-UpdateRebootRequested
#>

function Set-UpdateRebootRequested
{
    [CmdletBinding(SupportsShouldProcess=$true)]
    Param
    (
        [Parameter(Mandatory=$true)]
        [string]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        [PSCredential] [System.Management.Automation.Credential()]
        $Credential
    )
    $ErrorActionPreference = "Stop"

    Trace-Execution "Setting UpdateRebootRequest on $ComputerName"
    # Using UTC and Ticks to avoid format and timezone change issues
    if ($PSCmdlet.ShouldProcess($ComputerName))
    {
        Invoke-Command -ComputerName $ComputerName -Credential $Credential -ScriptBlock {
            [DateTime]::UtcNow.Ticks | Export-Clixml -Path $using:UpdateRebootRequestedPath
        }
    }
}

<#
.Synopsis
    Internal function to apply cabs for KBs to a computer
.Link
    Install-Update
#>

function Install-UpdateKB
{
    Param
    (
        # Computer name to update
        [Parameter(Mandatory=$true)]
        [string]
        $ComputerName,

        # Explicit Credential for CredSSP
        [Parameter(Mandatory=$true)]
        [PSCredential] [System.Management.Automation.Credential()]
        $Credential,

        # Source for updates.
        [Parameter(Mandatory=$true)]
        [string]
        $SourcePath,

        # Optional Scratch directory for update installation
        [string]
        $ScratchDirectory = $null,

        # Install KBs sequentially - test hook
        [switch]
        $Sequential
    )

    Install-UpdateKBSubFolder -ComputerName $ComputerName -Credential $Credential -SourcePath (Join-Path $SourcePath "SSU") -ScratchDirectory $ScratchDirectory -Sequential:$Sequential
    Install-UpdateKBSubFolder -ComputerName $ComputerName -Credential $Credential -SourcePath (Join-Path $SourcePath "LCU") -ScratchDirectory $ScratchDirectory -Sequential:$Sequential
}

<#
.Synopsis
    Internal function to apply cabs for KBs to a computer
#>

function Install-UpdateKBSubFolder
{
    Param
    (
        # Computer name to update
        [Parameter(Mandatory=$true)]
        [string]
        $ComputerName,

        # Explicit Credential for CredSSP
        [Parameter(Mandatory=$true)]
        [PSCredential] [System.Management.Automation.Credential()]
        $Credential,

        # Source for updates.
        [Parameter(Mandatory=$true)]
        [string]
        $SourcePath,

        # Optional Scratch directory for update installation
        [string]
        $ScratchDirectory = $null,

        # Install KBs sequentially - test hook
        [switch]
        $Sequential
    )
    $ErrorActionPreference = "Stop"

    $stopWatch = New-Object Diagnostics.Stopwatch
    $stopWatch.Start()

    Trace-Execution "$([DateTime]::Now): Starting Install-UpdateKB"
    Trace-Execution ($PSBoundParameters | Out-String)
    Trace-Execution "invoking to $computername"

    [ScriptBlock] $block = {
        Write-Verbose "At $env:COMPUTERNAME, using $using:SourcePath"
        if (!(Test-Path $using:SourcePath))
        {
            Write-Warning "$using:SourcePath not reachable"
            return
        }

        if (!(Get-ChildItem -Path $using:SourcePath -Filter "*.cab"))
        {
            Write-Warning "There is no KB existing in $using:SourcePath"
            return
        }

        Write-Verbose "Tested sourcepath"

        $stopWatch = New-Object Diagnostics.Stopwatch
        $stopWatch.Start()

        Write-Verbose "$([DateTime]::Now): Starting Add-WindowsPackage"       

        $PackageArgs = @{
            Online = $true
            NoRestart = $true
            PackagePath = $using:SourcePath
            Verbose=$true 
        }

        if ($using:ScratchDirectory)
        {
            Write-Verbose "Installing updates using ScratchDirectory '$($using:ScratchDirectory)'"
            New-Item -ItemType Directory -Path $using:ScratchDirectory -Force 
            try
            {
                $result = Add-WindowsPackage @PackageArgs -ScratchDirectory $using:ScratchDirectory
            }
            finally
            {
                Remove-Item -Force -Recurse -Path $using:ScratchDirectory -ErrorAction Ignore
            }
        }
        else
        {
            $result = Add-WindowsPackage @PackageArgs
        }

        $stopWatch.Stop()
        Write-Verbose "$([DateTime]::Now), Elapsed: $($stopWatch.Elapsed), Restart Needed $($result.RestartNeeded)"

        return $result
    }

    $result = $null
    if (!$Sequential)
    {
        # ISSUE: This a long running job, potentially affected by network glitches
        # or service fabric failovers.
        # Consider potentially converting to a scheduled task type approach.
        # Even creating PS Jobs as in Common\Helpers\Invoke-JobCommon wouldn't
        # necessarily re-connect if the PS session goes away. Need to verify
        # underlying DISM behavior when this disconnects abruptly.
        try
        {
            $result = Invoke-Command -Credential $Credential -Authentication Credssp -ComputerName $ComputerName -ScriptBlock $block
            if ($result.RestartNeeded)
            {
                Set-UpdateRebootRequested -ComputerName $ComputerName -Credential $Credential
            }
        }
        catch
        {
            # Due to throw, unable to determine if batch application required reboot. Assume yes.
            Set-UpdateRebootRequested -ComputerName $ComputerName -Credential $Credential

            if ($_.Exception -imatch "0x800f081e")
            {
                Trace-Warning "Skipping not applicable update $($package.PackageName) from $($cab.Name), HRESULT 0x$('{0:X8}' -f $_.Exception.HResult)"
            }
            else
            {
                throw $_.Exception
            }
        }
    }
    else # Sequential install of updates
    {
        # build install state list
        $targetPackages = Invoke-Command -Credential $Credential -ComputerName $ComputerName -ScriptBlock {
            Get-WindowsPackage -Online -Verbose
        }
        $installStates = @{}
        foreach ($package in $targetPackages)
        {
            $installStates[$package.PackageName] = $package
        }

        $originalSourcePath = $SourcePath

        $cabs = Get-ChildItemLocalOrUnc -Path $originalSourcePath -Include "*.cab" -ComputerName $ComputerName -Credential $Credential

        $rebootRequested = $false
        $thrownException = @()
        try
        {
            foreach ($cab in $cabs)
            {
                $package = Invoke-Command -Credential $Credential -ComputerName $ComputerName -Authentication Credssp -ScriptBlock {
                    return Get-WindowsPackage -Online -PackagePath $using:cab
                }

                $remotePackage = $installStates[$package.PackageName]

                Trace-Execution "$cab, Target package state: $($remotePackage.PackageState), $($package.PackageName)"
                if ((!$remotePackage) -or ($remotePackage.PackageState -ne "Installed"))
                {
                    $SourcePath = $cab.FullName
                    try
                    {
                        $result = Invoke-Command -Credential $Credential -Authentication Credssp -ComputerName $ComputerName -ScriptBlock $block
                        if ($result.RestartNeeded)
                        {
                            $rebootRequested = $true
                        }
                    }
                    catch
                    {
                        if ($_.Exception -imatch "0x800f081e")
                        {
                            Trace-Warning "Skipping not applicable update $($package.PackageName) from $($cab.Name), HRESULT 0x$('{0:X8}' -f $_.Exception.HResult)"
                        }
                        else
                        {
                            # Something unexpected happened. Continue applying other updates,
                            # but assume reboot is probably required.
                            $rebootRequested = $true
                            $thrownException += $_
                        }
                    }
                }
                else
                {
                    Trace-Execution "Skipping $cab, $($package.InstallTime), $($package.PackageName)"
                }
            }
        }
        finally
        {
            if ($rebootRequested)
            {
                Set-UpdateRebootRequested -ComputerName $ComputerName -Credential $Credential
            }
        }
        if ($thrownException)
        {
            Trace-Warning "Re-throwing aggregated exceptions from sequential update installs"
            throw $thrownException
        }
    }
    $stopWatch.Stop()
    Trace-Execution "$([DateTime]::Now): Ending Install-UpdateKB, Elapsed: $($stopWatch.Elapsed), $ComputerName"
    return $result
}

<#
.Synopsis
    Internal function to apply update scripts to computer.
.Link
    Install-Update
#>

function Install-UpdateScript
{
    Param
    (
        # Computer name to update
        [Parameter(Mandatory=$true)]
        [string]
        $ComputerName,

        # Explicit Credential for CredSSP
        [Parameter(Mandatory=$true)]
        [PSCredential] [System.Management.Automation.Credential()]
        $Credential,

        # Source for updates
        [Parameter(Mandatory=$true)]
        [string]
        $SourcePath,

        # Allow unsigned PowerShell scripts
        [switch]
        $BypassExecutionPolicy
    )
    $ErrorActionPreference = "Stop"

    $scripts = Get-ChildItemLocalOrUnc -Path $SourcePath -Include "*.ps1" -ComputerName $ComputerName -Credential $Credential
    foreach ($script in $scripts)
    {
        # Execute scripts on computers, respecting the signing requirements for remote scripts unless a bypass is set.
        Trace-Execution "Invoking $script at $ComputerName, BypassExecutionPolicy: $BypassExecutionPolicy"

        Invoke-Command -Verbose -Credential $Credential -Authentication Credssp -ComputerName $ComputerName -ScriptBlock {
            if ($using:BypassExecutionPolicy) { Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass }
            & $using:script
        } | Out-Null
    }
}

<#
.Synopsis
    Internal function to validate KBs were installed successfully to a computer.
#>

function Test-UpdateKB
{
    Param
    (
        # Computer name to validate
        [Parameter(Mandatory=$true)]
        [string]
        $ComputerName,

        # Explicit Credential for CredSSP
        [Parameter(Mandatory=$true)]
        [PSCredential]
        $Credential,

        # Source for updates.
        [Parameter(Mandatory=$true)]
        [string]
        $SourcePath
    )
    $ErrorActionPreference = "Stop"

    Trace-Execution "$([DateTime]::Now): Starting Test-UpdateKB"
    Trace-Execution "Testing state of Windows Update installation on $ComputerName."

    $cabs = @()
    $cabPaths = @((Join-Path $SourcePath "SSU"), (Join-Path $SourcePath "LCU"))
    $cabs = Get-ChildItemLocalOrUnc -Path $cabPaths -Include "*.cab" -ComputerName $ComputerName -Credential $Credential

    $notInstalledKBs = @()

    foreach ($cab in $cabs)
    {
        try
        {
            $package = Invoke-Command -Credential $Credential -ComputerName $ComputerName -Authentication Credssp -ScriptBlock {
                return Get-WindowsPackage -Online -PackagePath $using:cab
            }

            if ($package -and ($package.PackageState -ieq "Installed" -or $package.PackageState -ieq "Superseded"))
            {
                Trace-Execution "$cab was installed successfully on $ComputerName."
            }
            else
            {
                Trace-Warning "$cab was not installed on $ComputerName."
                $notInstalledKBs += $cab
            }
        }
        catch
        {
            Trace-Warning "$cab was not installed on $ComputerName."
            $notInstalledKBs += $cab
        }
    }

    if ($notInstalledKBs.Count -ge 1)
    {
        Trace-Error "The following KBs were not installed on $ComputerName : $notInstalledKBs."
    }

    Trace-Execution "$([DateTime]::Now): Test-UpdateKB completed successfully on $ComputerName."
}

<#
.Synopsis
    Pre-processes a directory containing to extract the underlying cabs.
.Description
    This is typically a pre-packaging step not performed on a running stamp.
    Caller is assumed to have access to Source and Destination, without requiring credentials.
#>

function Copy-ContentToStagingFolder
{
    [CmdletBinding()]
    Param
    (
        # Folder containing raw MSUs downloaded from Microsoft Catalog
        [Parameter(Mandatory=$true)]
        [string]
        $Source,

        # Output directory for flat folder of .CAB files suitable for DISM Add-WindowsPackage
        [Parameter(Mandatory=$true)]
        [string]
        $Destination,

        # Source is a WSUS Export
        [switch]
        $WSUSExport = $false,

        # Delete all existing content in the staging folder
        [switch]
        $PurgeExisting
    )
    $ErrorActionPreference = "Stop"

    # Imports
    Import-Module (Join-Path $PSScriptRoot "Modules\Get-FreeDriveLetter.psm1")

    $stopWatch = New-Object Diagnostics.Stopwatch
    $stopWatch.Start()

    Trace-Execution "$([DateTime]::Now): Starting Copy-ContentToStagingFolder from $Source to $Destination, Purge: $PurgeExisting"

    # Find all MSUs, expand, copy the .CAB to a single folder
    if (!(Test-Path $Source))
    {
        Trace-Error "$Source not accessible as source for MSUs"
    }

    $DestinationDrive = $null
    $SourceDrive = $null

    # MSU folder and file names can be very long and will exceed .NET limits in
    # a reasonably named share. Persistent PS drives will act as shortened
    # path names.
    # PSDrives, even though declared persistent, will only remain
    # mapped for the duration of their scope. No finally clean-up needed.

    $SourceDrive = New-PSDrive -Scope Local -Persist -Name (Get-FreeDriveLetter) -Root $Source -Description "Source for MSUs" -PSProvider FileSystem
    $Source = "$SourceDrive`:"

    $DestinationDrive = New-PSDrive -Scope Local -Persist -Name (Get-FreeDriveLetter) -Root $Destination -Description "Destination for extracted cabinets" -PSProvider FileSystem
    $Destination = "$DestinationDrive`:"

    if ($PurgeExisting)
    {
        Remove-Item (Join-Path $Destination *) -Include "*.cab"
    }

    if ($WSUSExport)
    {
        Copy-WSUSContentToStagingFolder -Source $Source -Destination $Destination
    }
    else
    {
        Copy-MSUContentToStagingFolder -Source $Source -Destination $Destination
    }

    $stopWatch.Stop()

    Trace-Execution "Ending Copy-ContentCabsToStagingFolder $([DateTime]::Now), Elapsed: $($stopWatch.Elapsed)"
}

function Copy-FileViaRoboCopy
{
    [Diagnostics.CodeAnalysis.SuppressMessage("PSAvoidGlobalVars", "global:LASTEXITCODE", Scope="Function")]
    Param
    (
        [Parameter(Mandatory=$true)]
        [string]
        $Source,

        [Parameter(Mandatory=$true)]
        [string]
        $Destination,

        [Parameter(Mandatory=$true)]
        [string]
        $Name
    )

    # Robocopy can handle the long file names
    robocopy /R:5 /W:5 /NP /NJH /NJS /NDL /NFL $cab.DirectoryName $Destination $cab.Name
    $result = $LASTEXITCODE
    switch ($result)
    {
        0
        {
            # No file copied, okay in a merging (non-Purge) scenario
            if ($PurgeExisting)
            {
                Trace-Error "No file copied, but -Purge was specified"
                $global:LASTEXITCODE = 1
            }
        }
        1
        {
            # Expected result
            $global:LASTEXITCODE = 0
        }
        default
        {
            Trace-Error "RoboCopy returned unexpected LastExitCode: $result"
        }
    }
}

function Copy-MSUContentToStagingFolder
{
    Param
    (
        # Folder containing raw Content
        [Parameter(Mandatory=$true)]
        [string]
        $Source,

        # Output directory for flat folder of .CAB files suitable for DISM Add-WindowsPackage
        [Parameter(Mandatory=$true)]
        [string]
        $Destination
    )

    # Extracted files are assumed not to hit long file name issues
    $extractTemp = Join-Path $env:TEMP "UpdateContentExpansion"

    $packages = Get-ChildItem -Recurse -Path $Source  -Include "*.msu"
    foreach ($msu in $Packages)
    {
        if (Test-Path $extractTemp)
        {
            Remove-Item $extractTemp -Recurse -Force
        }

        New-Item -ItemType Directory $extractTemp | Out-Null

        try
        {
            #Expand.exe can handle the long file names.
            # Note that a non-compressed file will "expand" with no error - it's just a straight file copy.
            expand.exe -F:* $msu $extractTemp | Out-Null
            $result = $LastExitCode
            if (0 -ne $result)
            {
                Trace-Error "Expand.exe returned unexpected non-zero result: $result"
            }

            $cab = Get-ChildItem "$extractTemp\*" -Include "*.cab" -Exclude "WSUSSCAN.cab"
            if ($cab -and $cab.Count -eq 1)
            {
                Trace-Execution "Writing $($cab.Name) from $msu"
                Copy-FileViaRoboCopy $cab.DirectoryName $Destination $cab.Name
            }
            else
            {
                Trace-Error "Unexpected cabinet state found in $msu"
            }
        }
        finally
        {
            Remove-Item $extractTemp -Recurse -Force
        }
    }
}

function Copy-WSUSContentToStagingFolder
{
    Param
    (
        # Folder containing raw Content
        [Parameter(Mandatory=$true)]
        [string]
        $Source,

        # Output directory for flat folder of .CAB files suitable for DISM Add-WindowsPackage
        [Parameter(Mandatory=$true)]
        [string]
        $Destination
    )

    # Extracted files are assumed not to hit long file name issues
    $extractTemp = Join-Path $env:TEMP "UpdateContentExpansion"

    $packages = Get-ChildItem -Recurse -Path $Source  -Include "*.cab"
    if ($PurgeExisting)
    {
        Remove-Item (Join-Path $Destination *) -Include "*.cab"
    }

    foreach ($cab in $packages)
    {
        if (Test-Path $extractTemp)
        {
            Remove-Item $extractTemp -Recurse -Force
        }

        New-Item -ItemType Directory $extractTemp | Out-Null

        try
        {
            $keyFile = "update.cat"
            # Expand.exe can handle the long file names.
            # Note that a non-compressed file will "expand" with no error - it's just a straight file copy.
            expand.exe -F:$keyFile $cab $extractTemp | Out-Null
            $result = $LastExitCode
            if (0 -ne $result)
            {
                Trace-Error "Expand.exe returned unexpected non-zero result: $result"
            }

            $manifest = Get-ChildItem "$extractTemp\*" -Include $keyFile
            if ($manifest)
            {
                Trace-Execution "Staging $($cab.Name) from $Source"
                Copy-FileViaRoboCopy $cab.DirectoryName $Destination $cab.Name
            }
            else
            {
                Trace-Execution "Skipping non MSU package $($cab.Name)"
            }
        }

        finally
        {
            Remove-Item $extractTemp -Recurse -Force
        }
    }
}

# Test if the specified path is a UNC path.
function Test-IsUncPath
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory=$true)]
        [string]
        $Path
    )

    Trace-Execution "Testing if $Path is a UNC path."
    if ($Path.Contains(":"))
    {
        return $false
    }
    else
    {
        return $true
    }
}

# If the path is a UNC path we can directly find the files from this path. However if this is a local CSV path
# used for host update, we have to do the file search in a remote session to the node being updated.
function Get-ChildItemLocalOrUnc
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory=$true)]
        $Path,

        [Parameter(Mandatory=$true)]
        $Include,

        [Parameter(Mandatory=$true)]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        $Credential
    )

    if (Test-IsUncPath -Path $Path)
    {
        return Get-ChildItem -Path (Join-Path $Path *) -Include $Include
    }
    else
    {
        return (Invoke-Command -Credential $Credential -ComputerName $ComputerName -ScriptBlock {
            if (-not (Test-Path $using:Path))
            {
                return $null
            }
            else
            {
                Get-ChildItem -Path (Join-Path $using:Path *) -Include $using:Include
            }
        })
    }
}


# Public
Export-ModuleMember -Function Set-UpdateRebootRequested
Export-ModuleMember -Function Test-UpdateRebootRequested
Export-ModuleMember -Function Install-Update
Export-ModuleMember -Function Copy-ContentToStagingFolder
# Internal
Export-ModuleMember -Function Install-UpdateScript
Export-ModuleMember -Function Install-UpdateKB
Export-ModuleMember -Function Install-UpdateCIPolicy
Export-ModuleMember -Function Test-UpdateKB
Export-ModuleMember -Function Test-IsUncPath
Export-ModuleMember -Function Get-ChildItemLocalOrUnc
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCQWPm5eXrjpV6a
# gTr+wnhmXDhod7yhkgVFRcICxlMuGKCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHpSCoUokvw7evTjCvUhHcpg
# IAuouFozI5lRHzOUQOivMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAObwBg6YU4UVzfFqAqdwdmB3aaVNx6v9pXtNBq+D02kJLx96n0RWxprBJ
# MElkI/RFvoFMz4+GLxJut0JEatdQubk4xy0FF4OgCqiP5k+M34gKhuHQBFs/Jxrh
# oQ0iosYq5hwOBwrmevxFTfWWHGfEZjrhVviFrzs1AyqAteLugljfn62yoIDiFgYd
# MY2svB0nD4y9QSGMXjBfepxtGAFTpArJtrNpZRaFO94/mQTSh92jmKD5Eliwelpi
# fGnrdXeHa3hsK1ryKVqNVtufjRctiH/drCbg0ormdFbq52FdA6DPT2MHJZVa7ZiV
# v6JP7InKkB3z3acFKXBHE5N9VFRGSqGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAiQ7HJ1LqoKpRd0vnTAqy3pv98kFhX7l4dvhr2A6CRxwIGZQuU30Rl
# GBMyMDIzMDkyMjA4MzEwMi40NDNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAG59gANZVRPvAMAAQAAAbkwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjIw
# OTIwMjAyMjE3WhcNMjMxMjE0MjAyMjE3WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAONJPslh9RbHyQECbUIINxMF
# 5uQkyN07VIShITXubLpWnANgBCLvCcJl7o/2HHORnsRcmSINJ/qclAmLIrOjnYnr
# bocAnixiMEXC+a1sZ84qxYWtEVY7VYw0LCczY+86U/8shgxqsaezKpWriPOcpV1S
# h8SsOxf30yO7jvld/IBA3T6lHM2pT/HRjWk/r9uyx0Q4atx0mkLVYS9y55/oTlKL
# E00h792S+maadAdy3VgTweiwoEOXD785wv3h+fwH/wTQtC9lhAxhMO4p+OP9888W
# xkbl6BqRWXud54RTzqp2Vr+yen1Q1A6umyMB7Xq0snIYG5B1Acc4UgJlPQ/ZiMkq
# gxQNFCWQvz0G9oLgSPD8Ky0AkX22PcDOboPuNT4RceWPX0UVZUsX9IUgs7QF41Hi
# QSwEeOOHGyrfQdmSslATrbmH/18M5QrsTM5JINjct9G42xqN8VF9Z8WOiGMjNbvl
# pcEmmysYl5QyhrEDoFnQTU7bFrD3JX0fIfu1sbLWeBqXwbp4Z8yACTtphK2VbzOv
# i4vc0RCmRNzvYQQ2PjZ7NaTXE4Gu3vggAJ+rtzUTAfJotvOSqcMgNwLZa1Y+ET/l
# b0VyjrYwFuHtg0QWyQjP5350LTpv086pyVUh4A3w/Os5hTGFZgFe5bCyMnpY09M0
# yPdHaQ/56oYUsSIcyKyVAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUt7A4cdtYQ5oJ
# jE1ZqrSonp41RFIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAM3cZ7NFUHRMsLKz
# jl7rJPIkv7oJ+s9kkut0hZif9WSt60SzYGULp1zmdPqc+w8eHTkhqX0GKCp2TTqS
# zBXBhwHOm8+p6hUxNlDewGMZUos952aTXblAT3OKBnfVBLQyUavrSjuJGZAW30cN
# Y3rjVDUlGD+VygQHySaDaviJQbK6/6fQvUUFoqIk3ldGfjnAtnebsVlqh6WWamVc
# 5AZdpWR1jSzN/oxKYqc1BG4SxxlPtcfrAdBz/cU4bxVXqAAf02NZscvJNpRnOALf
# 5kVo2HupJXCsk9TzP5PNW2sTS3TmwhIQmPxr0E0UqOojUrBJUOhbITAxcnSa/IMl
# uL1HXRtLQZI+xs2eRtuPOUsKUW71/1YeqsYCLHLvu82ceDVQQvP7GHEEkp2kEjio
# fbjYErBo2iCEaxxeX4Z9HvAgA4MsQkbn6e4EFQf13sP+Kn3XgMIvJbqLJeFcQja+
# SUeOXu5cfkxe0GzTNojdyIwzaHlhOflVRZNrxee3B+yZwd3JHDIvv71uSI/SIzzt
# 9cU2GyHQVqxBSrRtKW6W8Vw7zpVvoVsIv3ljxg+7NiGSlXX1s7zbBNDMUj9OnzOl
# HK/3mrOU8YEuRf6RwakW5UCeGamy5MiKu2YuyKiGBCv4OGhPstNe7ALkEOh8BX12
# t4ntuYu+gw9L6yCPY0jWYaQtzAP9MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAx2IeGHhk58MQkzzSWknGcLjfgTqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOi3ZL4wIhgPMjAyMzA5MjIwODU2MzBaGA8yMDIzMDkyMzA4NTYzMFowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6LdkvgIBADAKAgEAAgINWAIB/zAHAgEAAgITyjAK
# AgUA6Li2PgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEJvYkqtCDi+RS6V
# hHIUtpS2klx3rbNGm88LZzxYUfudLRuKNipH/VdeAbwZD9PAPc50erMxcsp0qwgL
# ziUUdlDAgdsErqbH+TRL8/Tf9w5Qas5ICyOK8gi63OJsJa019DoZWUaFfFA1AWui
# 4mn4DWjaAtZXsxyH4xdjugn68D8MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAG59gANZVRPvAMAAQAAAbkwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgTUaEIV6oyQsw/ugJSG1qhfXHwu/BUDLBIW3IO5qsnEUwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCBk60bO8W85uTAfJVEO3vX2aLaQFcgcGpdwsOoi
# +foP9DCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# ufYADWVUT7wDAAEAAAG5MCIEIBuRDNWZqNYBMArt+02LZf4Va2kbad6pjchB++0R
# E+UNMA0GCSqGSIb3DQEBCwUABIICAIbivNZshERSk5GIiK0wkcAXRnRE5E9qluGc
# tEe6vQI0q4sprx8ACgUTE2T9NcRQ+yAHr3YBUXWS+CCPh8Ea+13fx9Yu12R3YX5u
# kn61eTOYtE9IA0ZG9Wpj4/dHBBrFa8rs9jHujKQYPtT6WnlEJimW7X279WoObKRs
# ezWkVaScNx8L9w4caiU1t92CEKTeIbKjqyUlRKeJtviifvoUS573l7I5zMSZ2v16
# dMozsRfNZyrBEoZ8MXIcCi5lyKs9Cei+jwZ4yRVjIt8ri6IoTPeKkYYYULAQzgsX
# kGMnQE26dvcepA1DnnYhX7ubEPioCIKk2y1Av/X10vJnh4mrQSBiOwHJq0unj3Kn
# EibBSfLfKXwD54Q+ybVy0ubgZnDCqggSDdS+0XB3U1c6wjQAPiKejy14KDqU0CsQ
# jrIe2O2CpBiMQgirihWEGUFcLHGjA4KGv/oGkhSvLnpq3XO+i1grR8xM2Dm3yITH
# czPPA5V5r1zeq9huUsBEJZ0om/DLx+tQVUfbCCCUYxFHQeU9MVxJNlAX0Y52/gyN
# OhcVF2VXv8NDgkOtVci5+/8zDPTjtwgtY75GBllnDtyuDTYeVFe2SF8Uq4g7ca5+
# 1rMWXUG41d0Yvv2N1vKGGR1ZBsnRPcfMVqSYWo6vuSHd5zZWEwAvK/WRKjLaEkdb
# apGVdRxQ
# SIG # End signature block